CompTIA Security+

Ramasankara Rao

This CompTIA certification course imparts broad knowledge to develop expertise in security-related matters and risk management. ...

Price
RM2,450.00
HRDC Claimable

Upskill
Part Time
Online
7 Hours Daily, 5 Days: 10am - 5pm
What To Expect

The CompTIA Security+ certification course aims to train information technology students with adequate skills and knowledge required to network security issues and efficiently tackle them. Being vendor-neutral, this CompTIA certification course imparts broad knowledge to develop expertise in security-related matters and risk management.

The updated CompTIA Security+ exam SY0-601 is recognised all over the globe for validation of basic-level of security skills and knowledge. It is widely used by organisations, security professionals/analysts and penetration testers.

After completing the CompTIA Security+ course and certification, students can demonstrate a high level of competency in Network Security.

Recommended Path

To achieve CompTIA Security Analytics Professional you will need to attend the CompTIA CySA+ training and pass the exam.

Who Should Attend This Course
  • Candidates working in the IT Security area.
  • IT security support staff.
  • Network Security Engineers.
  • Cybersecurity Analysts.
Prerequisites

Computer networking knowledge.

General Program
  • Differentiating among various systems security threats
  • Explaining the security risks pertaining to system hardware and peripherals
  • Implementing OS hardening practices and procedures to achieve security
  • Carrying out the appropriate procedures to establish application security
  • Implementing security applications
  • Explaining the purpose and application of virtualisation technology
  • Differentiating between the different ports and protocols, their respective threats
  • Distinguishing between network design elements and components
  • Determining the appropriate use of network security tools to facilitate network security
  • Applying the appropriate network tools to facilitate network security
  • Explaining the vulnerabilities and mitigation strategies associated with network devices
  • Explaining the vulnerabilities and mitigation strategies associated with various transmission media
  • Explaining the vulnerabilities and implement mitigation strategies associated with wireless networking
  • Identifying and applying industry best practices for access control methods
  • Explaining common access control models and the differences between each
  • Organising users and computers into appropriate security groups and roles
  • Applying appropriate security controls to file and print resources
  • Comparing and implement logical access control methods
  • Summarising the various authentication models and identify the components of each
  • Deploying various authentication models and identify the components of each
  • Explaining the difference between identification and authentication (identity proofing)
  • Explaining and applying physical access security methods
  • Conducting risk assessments and implementing risk mitigation
  • Carrying out vulnerability assessments using common tools
  • Explaining the use of penetration testing versus vulnerability scanning
  • Using monitoring tools on systems and networks and detecting security-related anomalies
  • Comparing various types of monitoring methodologies
  • Executing proper logging procedures and evaluating the results
  • Conducting periodic audits of system security settings
  • Explaining general cryptography concepts
  • Explaining basic hashing concepts and mapping various algorithms to appropriate applications
  • Explaining basic encryption concepts and mapping various algorithms to appropriate applications
  • Explaining and implementing protocols
  • Explaining core concepts of public key cryptography
  • Implementing PKI and certificate management
  • Explaining redundancy planning and its components
  • Implementing disaster recovery procedures
  • Differentiating between and executing appropriate incident response procedures
  • Identifying and explaining applicable legislation and organisational policies
  • Explaining the importance of environmental controls
  • Explaining the concept of how to reduce the risks of social engineering
Certificate

Certificate of completion

Exam and Professional Certification

CompTIA Security+ exam SY0-601 upon passing the exam.

  1. Will I get a certificate at the end of the course?

    Complete Reskill Programs: Absolutely! The certificate will be issued by airasia academy and powered by Google Cloud.

    Byte Sized Courses: Yes, we will award you with a certificate for all byte-sized courses with EIGHT (8) learning hours and above. The certificate will be issued by airasia academy and powered by Google Cloud. If you completed less than 8 hours, no certificate will be given.

    BINA Digital: Yes, we will award you with a certificate upon full attendance of the programme. The certificate will be issued by airasia academy and powered by Google Cloud.

  2. Can I get a job after attending the course?

    The certificate from airasia academy is recognised by the industry which is sufficient to land you a job. But, if you manage to stand out and earn excellent results, our trainers may recommend you to companies within the airasia group and Google Cloud ecosystem, or to their extensive network of businesses. That means you will have a good shot kickstarting a new career!

  3. Who can I refer to get more insight of the courses?

    You may drop us a WhatsApp message at 010-5008787. Kindly take note that our working hours are 9 am - 6 pm from Monday to Friday and our friendly team will reply to you as soon as we can. However, do expect a slight delay in reply in enquiries over the weekend. Or you can follow our social media accounts @airasiaacademy (Facebook, Instagram, Linkedin)

  4. What payment methods do you accept?

    We currently accept debit card and credit card. We're also happy to announce that we now have interest-free* instalment plans!

    *Interest-Free Instalment plans are currently available for ILT courses only, and applies to Maybank and Public Bank credit card holders, with a minimum purchase of RM500 and above.

  5. Do you offer any free learning resources?

    Yes, we do! Kindly refer to the Resources page. We have conducted free introductory sessions via our YouTube channel where you can watch it anytime and anywhere.

  6. What is the difference between RCOC-B and RCOC-EVLOS Module 1?

    The Remote Pilot Certificate of Competency - Basic (RCoC-B) satisfies the requirements within the Specific category (medium risk category). The RCoC-B satisfies the competency requirements of a published *PDRA or *STS that involves *VLOS flights. The following operations usually falls within the specific category:

    • Agriculture
    • Flying the drone above 400ft
    • Flying Beyond Visual Line of Sight (BVLOS)
    • Pre-Defined Risk Assessment (PDRA)
    • Standard Scenario (STS)
    • Visual Line of Sight (VLOS)

    The Remote Pilot Certificate of Competency Extended Visual Line of Sight Module 1 (RCoC (EVLOS) Module 1) is an additional module which enables Extended Visual Line of Sight operations. The prerequisite for attending Module 1 is RCoC-B which will imply that all Remote Pilots are required to be competent on RCoC-B before attending the Module 1 course.

Meet your instructor
Ramasankara Rao

Rama is a cybersecurity and IT Infrastructure consultant and has been in the industry for around 20 years. He has been delivering trainings and providing cybersecurity consultancy to the US Navy based in Guam, a US territory from 2012. He has been a proctor for Cisco, delivering trainings and conducting exams to the aspiring Cisco Instructors around APAC, Gulf, and New Zealand.

As an entrepreneur, he was at IT Consultancy organisation in Brunei, providing cybersecurity trainings to the govt of Brunei (EGNC), Shell and IT Protective Security Services Sdn Bhd (ITPSS), Brunei. He delivered trainings to Multi-National Organisations like AT&T in Tokyo, Japan.

In Malaysia, he has been part of a number of training providers as a lead trainer delivering cybersecurity trainings from CISSP (Certified Information Systems Security Professional), CISM Certified Information Security Manager to EC-Council’s cybersecurity programs. He has also conducted Trainer the Trainer programs in Malaysia and Singapore on behalf of CompTIA.

Price
RM2,450.00
HRDC Claimable

Upskill
Part Time
Online
7 Hours Daily, 5 Days: 10am - 5pm